Bluetooth Hotspot
Total Page:16
File Type:pdf, Size:1020Kb
ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014 Bluetooth Hotspot Pooja Abnave1, Priyanka Patil2, P.L.Himabindu3, Prashant Dukare4, S.S.Vanjire5 Student, Department Of Computer Engineering, University of Pune, Pune, India1 Student, Department Of Computer Engineering, University of Pune, Pune, India2 Student, Department Of Computer Engineering, University of Pune, Pune, India3 Student, Department Of Computer Engineering, University of Pune, Pune, India4 Assistant Professor, Department Of Computer Engineering, University of Pune, Pune, India5 Abstract: Bluetooth is a technology for short range wireless real-time data transfer between devices. It is becoming increasingly more prevalent in modern society, with technical gadgets now ranging from mobile phones and game controllers to PDAs and personal computers. Bluetooth hotspot is a technology which allows Bluetooth enabled mobiles (clients) to access the internet. With this technology mobile phones need not have a GPRS connection in it. Before accessing the internet Bluetooth mobiles (devices) need to be discoverable. The Bluetooth server discovers all devices in its range and sends a message for pairing. The connection link is established when an appropriate message is sent by the discovered device for pairing in response to the servers message. In this paper we will study how communication links are established, what are the security issues and how they are handled in Bluetooth and the data packet format. Keywords: Eavesdropping; Ad-hoc network; Bluetooth Network; Bluetooth Security; Media Access I. INTRODUCTION II. NEED Ad hoc networks today are based primarily on Bluetooth As the number of Bluetooth products increases each year, it technology. Bluetooth is an open standard for short-range is important to develop applications and services to take full digital radio. It is touted as a low-cost, low-power, and low advantage of their potential and capabilities. A broadband profile technology that provide a mechanism for creating hotspot is one application where Bluetooth has a value in small wireless networks on an ad hoc basis. Bluetooth is providing Internet access to mobile users. Consumers considered a wireless PAN technology that offers fast and owning a Bluetooth enabled mobile phone can easily access reliable transmission for both voice and data. Untethered a Bluetooth hotspot to browse the Internet without having to Bluetooth devices will eliminate the need for cables and carry a PDA or a laptop. provide a bridge to existing networks. Two devices must have the same type of link in order to Today, the majority of people are in possession of a mobile establish communication. The concept behind a Bluetooth phone. The number of mobile phone users is increasing each communication is the use of “masters” and “slaves”. The year. Mobile phone creates more possibilities for social master device works as the moderator in the communication networking. The deployment of Bluetooth hotspots will between itself and the slave devices as well as between the widen access to broadband services using mobile phones not slave devices themselves. Bluetooth hotspot uses this master only to professionals and mobile workers but more importantly, to other segments of consumers who want to go slave architecture were Bluetooth server acts as the master on-line for non-business related and sociable purposes, and and other Bluetooth enabled mobile devices as slaves. to consumers who do not own PCs. III. BASIC STEPS Steps to be followed in Bluetooth hotspot are: • Connectivity • Authentication and security • Data transfer In Bluetooth hotspot we require a Bluetooth server with Fig. 1. Piconet master slave Bluetooth architecture internet connection in it, Any Bluetooth enabled mobile Copyright to IJARCCE www.ijarcce.com 4894 ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014 which wants to be connected to Bluetooth server and use the B. Communication link method: services provided by it. A communication link is data transmission connection between a master and slave for sending and receiving data The process starts with connectivity process in which packets. Bluetooth server sending a message of pairing to all the discoverable mobile devices in its range. As the services of The master sets up a communication link to a slave by using Bluetooth hotspot are to be provided to authorized users slave information when the master establishes a connection various security issues like eavesdropping and false with the slave, and it controls data transmission to confirm authentication are considered. The devices receiving the whether the slave can communicate with it[5]. message need to send an appropriate response (passkey) to the server back to complete the authentication. Now the connection link is established and the data/ file transfer can take place. Now the server sends the client program which needs to be installed on the mobile devices. After installation client requests for the web page which is queued at the server site and maintained by hotspot manager which keeps tracks of what request is made and who requests it. Now the request is taken out from queue one by one and requested page is fetched from internet. This page is now converted into mobile format by the HTML parser and Fig. 3. Communication link Method sent to the appropriate client who requested it. Due to some erroneous detection in the above methods they Now we will see in detail the connectivity, security and data were improved and were renamed as: transfer mechanisms in Bluetooth. Advanced inquiry method, IV. CONNECTIVITY RSSI method. Identification and authorization are the two important steps for having trusted connection between two Bluetooth devices. Connectivity is the first step for establishing any A. Advanced inquiry method: connection[5].This can be achieved by using two methods If the Bluetooth function of the PC (master) gets the slave namely, information of the authentication key once within a set period of time, the advanced inquiry method judges that the • Inquiry method (Inquiry function of Bluetooth) user is sitting in front of the PC[5]. • Communication link method (Monitoring B. RSSI method: communication link) RSSI (Received Signal Strength Indication): In A. Inquiry method: telecommunications, RSSI is a measure of the power of a The inquiry method detects the user's presence by using the received radio signal; that is, RSSI quantifies the strength of inquiry function. The Bluetooth device of the PC (master) a radio signal. In general, the value of RSSI decreases as the gets the slave information of surrounding Bluetooth devices relative distance with a communication partner increases. by running the inquiry function regularly. The PC then RSSI can therefore be used as a measure for expressing judges that the user is sitting in front of the PC if the relative distance with a communication partner[5]. acquired slave information indicates that the user’s In this method the PC begins to compare the RSSI value and Bluetooth device is specified as an authentication key[5]. the threshold value that was set for user. The PC judges that the user is sitting in front of the PC if the RSSI value is higher than the threshold value The communication link method can be finely controlled by comparing the RSSI and threshold values. To develop a presence-detection system with high detection accuracy at modest cost, a presence-detection method using the received signal strength indication (RSSI) function of a Bluetooth device was developed. The performance of this method under various environmental conditions was evaluated by a simulator[5]. Fig. 2. Inquiry Method Copyright to IJARCCE www.ijarcce.com 4895 ISSN (Online) : 2278-1021 ISSN (Print) : 2319-5940 International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014 Consequently they are able to eavesdrop on any traffic based on this key[1]. Authentication is performed with a challenge response scheme utilizing the E1 algorithm. E1 is a modification of the block cipher SAFER+. The scheme operates as follows: The verifier issues a 128 bit long challenge. The claimant then applies E1 using the challenge, its 48-bit Bluetooth address, and the current link key. He then returns the 32 most significant bits of the128 bit result. The verifier confirms the response, in which case the authentication has succeeded. In this case, the roles are switched and the same Fig. 4. RSSI Method procedure is applied again, there by accomplishing mutual authentication[1]. V. SECURITY The Bluetooth challenge response algorithm differs from that used in 802.11b in very important ways. In 802.11b the When a user sends data over a wireless network, he has a challenge and response form a plaintext/cipher text pair. reasonable expectation that such data is not easily readable This fact, combined with the simplicity of the encryption by unauthorized persons. Unlike a wired network, which method (XOR), allow an intruder to easily determine the requires a physical intrusion, wireless data packets can be authentication key string by listening to one authentication received by anyone nearby with an appropriate receiver, procedure. In contrast, the Bluetooth authentication method potentially outside the physical security barriers of an never transmits the complete challenge response pair. In organization. addition, the E1 algorithm is not easily invertible. Thus even There are basically two main security issues in wireless if an attacker has recorded an authentication challenge technology which are needed to be considered for trust response session, he cannot (directly) use this data to building between two devices. compute the authentication key[1]. The known attacks on the E0 cipher used in Bluetooth are Eavesdropping far more computationally complex then corresponding Eavesdropping is the act of secretly listening to the private attacks on RC4 used in 802.11b.